Abstract
Network vulnerability mining is an important topic in cyberspace security. Network vulnerabilities enable attackers to obtain sensitive information from computer systems, control computer systems illegally and cause severe damage. More effective vulnerability mining requires wider participation of cybersecurity engineers and intelligent computing devices as cooperation among the mining participants could take advantages of the complementarity capabilities of human and machine. The human and resource cost of network vulnerability mining can be remarkably reduced and the mining efficiency is improved accordingly. The principles and engineering mechanisms of introducing collective intelligence to network vulnerability mining is discussed in the paper and a vulnerability mining platform based on crowd intelligence is established following a four-layer system structure. Experimental tests showed that cooperation enables mining participants to work better and learn from empirical information, while better mining results could be obtained through procedure optimization.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Benkler, Y., Hassan, M.: Collective Intelligence: Creating a Prosperous World at Peace. Earth Intelligence Network, Oakton (2008)
Shen, J., Deng, C., Gao, X.: Attraction recommendation: towards personalized tourism via collective intelligence. Neurocomputing 173, 789–798 (2016)
Introne, J., Goggins, S.: Advice reification learning and emergent collective intelligence in online health support communities. Comput. Hum. Behav. 99, 205–218 (2019)
Jeng, Y., Huang, Y.: Dynamic learning paths framework based on collective intelligence from learners. Comput. Hum. Behav. 100, 242–251 (2019)
Le, V., Nguyen, H., Lu, D., Nguyen N.: A solution for automatically malicious web shell and web application vulnerability detection. In: 8th International Conference on Computational Collective Intelligence (ICCCI), pp. 367–378. Springer, Cham (2016)
Le, V., et al.: GuruWS: a hybrid platform for detecting malicious web shells and web application vulnerabilities. In: Transactions on Computational Collective Intelligence XXXII, pp. 184–208. Springer, Heidelberg (2019)
Acknowledgments
This work is supported by National Key R&D Program of China No. 2017YFB08029 and is supported by Sichuan Science and Technology Program No. 2017GZDZX0002.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Han, Y., Chen, J., Rao, Z., Wang, Y., Liu, J. (2020). Vulnerability Discovery in Network Systems Based on Human-Machine Collective Intelligence. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds) Intelligent Human Systems Integration 2020. IHSI 2020. Advances in Intelligent Systems and Computing, vol 1131. Springer, Cham. https://doi.org/10.1007/978-3-030-39512-4_71
Download citation
DOI: https://doi.org/10.1007/978-3-030-39512-4_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39511-7
Online ISBN: 978-3-030-39512-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)